Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyDecember 2022
TAG: Tagged Architecture Guide
ACM Computing Surveys (CSUR), Volume 55, Issue 6Article No.: 124, Pages 1–34https://doi.org/10.1145/3533704Software security defenses are routinely broken by the persistence of both security researchers and attackers. Hardware solutions based on tagging are emerging as a promising technique that provides strong security guarantees (e.g., memory safety) while ...
- research-articleDecember 2021
Keeping Safe Rust Safe with Galeed
ACSAC '21: Proceedings of the 37th Annual Computer Security Applications ConferencePages 824–836https://doi.org/10.1145/3485832.3485903Rust is a programming language that simultaneously offers high performance and strong security guarantees. Safe Rust (i.e., Rust code that does not use the unsafe keyword) is memory and type safe. However, these guarantees are violated when safe Rust ...
- invited-talkNovember 2021
Research Frontiers for Moving Target Defenses
MTD '21: Proceedings of the 8th ACM Workshop on Moving Target DefensePages 27–28https://doi.org/10.1145/3474370.3485658New software security threats are constantly arising, including new classes of attacks such as the recent spate of micro-architectural vulnerabilities, from side-channels and speculative execution to attacks like Rowhammer that alter the physical state ...
- research-articleApril 2021
Code Specialization through Dynamic Feature Observation
CODASPY '21: Proceedings of the Eleventh ACM Conference on Data and Application Security and PrivacyPages 257–268https://doi.org/10.1145/3422337.3447844Modern software (both programs and libraries) provides large amounts of functionality, vastly exceeding what is needed for a single given task. This additional functionality results in an increased attack surface: first, an attacker can use bugs in the ...
- research-articleNovember 2020
Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems
MTD'20: Proceedings of the 7th ACM Workshop on Moving Target DefensePages 81–89https://doi.org/10.1145/3411496.3421224Moving-target defenses (MTDs) have been widely studied for common general-purpose and enterprise-computing applications. Indeed, such work has produced highly effective, low-overhead defenses that are now commonly deployed in many systems today. One ...
- research-articleJuly 2020
FuZZan: efficient sanitizer metadata design for fuzzing
USENIX ATC'20: Proceedings of the 2020 USENIX Conference on Usenix Annual Technical ConferenceArticle No.: 17, Pages 249–263Fuzzing is one of the most popular and effective techniques for finding software bugs. To detect triggered bugs, fuzzers leverage a variety of sanitizers in practice. Unfortunately, sanitizers target long running experiments--e.g., developer test suites--...
- research-articleJuly 2020
One Giant Leap for Computer Security
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 18, Issue 4Pages 8–19https://doi.org/10.1109/MSEC.2020.2977586Today's computer systems trace their roots to an era of trusted users and highly constrained hardware; thus, their designs fundamentally emphasize performance and discount security. This article presents a vision for how small steps using existing ...
- research-articleMay 2018
CUP: Comprehensive User-Space Protection for C/C++
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityPages 381–392https://doi.org/10.1145/3196494.3196540Memory corruption vulnerabilities in C/C++ applications enable attackers to execute code, change data, and leak information. Current memory sanitizers do not provide comprehensive coverage of a program»s data. In particular, existing tools focus ...
- surveyApril 2017
Control-Flow Integrity: Precision, Security, and Performance
ACM Computing Surveys (CSUR), Volume 50, Issue 1Article No.: 16, Pages 1–33https://doi.org/10.1145/3054924Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today’s systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the intended control ...